Which of the following will LEAST likely be detected through source code analysis?
A.
Improper certificate validation
B.
Buffer overflow vulnerability
C.
Improper build process
D.
Hardcoded credentials
Explanation:
Which of the following will LEAST likely be detected through source code analysis?
Which of the following will LEAST likely be detected through source code analysis?
A.
Improper certificate validation
B.
Buffer overflow vulnerability
C.
Improper build process
D.
Hardcoded credentials
Explanation: